• Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Menu
  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Dashboard
Popular Search fivem

Getting Started

  • What is Lectron?
  • FAQ
  • Locations
  • Features
  • Billings
  • Getting started
  • How to use the Dashboard
  • Why is this called Armor?
  • How to Configure SRV Record Correctly
  • How to report high ping issues to Lectron?

Beginner's Guide

  • What is the internet?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works
  • TCP vs. UDP Comparison
  • What is a server?
  • What is a DDoS attack?
  • What is a Firewall?
  • Protected: What is a port?
  • How to Configure SRV Record Correctly
  • Proxy Protocol
  • What is TCP Protocol?
  • What is UDP Protocol ?

Troubleshooting

  • High Latency and General Lag
  • Edge TLS
  • Ping and TraceRoute (tracert) commands
  • Understanding Network Address Translation (NAT)
  • What are SSL, TLS, HTTP and HTTPS?
  • Understanding IPv4 and IPv6
  • Understanding FTP (File Transfer Protocol)
  • What is Wireshark
  • Diagnosing Network Issues with MTR

Attack Types

  • SYN Flood
  • TCP Half-Open
  • DNS Reflection Attack
  • Denial of Service explained
  • DDoS through DNS Requests
  • UDP Flood
  • Vulnerability Attack
  • Phishing Attacks
  • Common Security Threats
  • Ping of Death ICMP Attack
  • Slowloris Attack

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Firewall

  • what is Firewall?
  • Home
  • Documentation
  • Protect
  • Getting Started
  • What is Lectron?

What is Lectron?

Table of Contents
  • How it Works
  • First Steps

We enhance security and acceleration for any TCP or UDP based application on all ports from 1 to 65535. That means you can route MQTT, email, file transfer, version control, games, anything over TCP or UDP through Lectron to mask the origin and protect it from DDoS, as well as increase the traffic quality tremendously.

We use anycast DDoS mitigation method and focus on the security, stability, and uptime of game, telnet, ssh, video, email servers, file streaming, video streaming servers and more. Our goal is to improve your end user experience by being the cosmic guard in front of your applications and make your experience running online services as enjoyable as possible.

How it Works #

Lectron is a distributed anycast proxy with over 200 locations around the world. That means we sit in front of your front facing application and intercept internet packets on your behalf, and then run our special algorithms to determine the legitimacy of incoming traffic to your service. When Lectron detects invalid or malicious traffic, we mitigate it and keep your services online.

First Steps #

At the moment, we specialize in providing games servers. To receive our premium solutions, visit our dashboard to get everything up and running in under 5 minutes!

Reactions
Share this Doc:
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on April 5, 2021
FAQ

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Table of Contents
  • How it Works
  • First Steps

join our newsletter

Get frequent news, updates and rewards !





We make the metaverse a better place.
Facebook-f Twitter Instagram Linkedin-in Youtube Github Twitch

Quick Menu

  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Menu
  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Copyright © Lectron, Inc. | All rights reserved
Trademarked with United States Patent and Trademark Office